RSA Conference show

RSA Conference

Summary: Information is power. And wherever there’s power, there are people looking to steal it. But that’s also where you’ll find us. We’re RSA Conference. And we’re here to stand against cyberthreats around the world. That means being here for you. Connecting you with the people and insights that will empower you to stay ahead of cyberthreats. We do this through our online outreach and with our events around the globe. And we make a great host, if we do say so ourselves. Some say it’s impossible to stay ahead of cybersecurity threats. We disagree. We’ll always be here as your go-to resource for exchanging ideas, learning the latest trends and finding the solutions for a more secure tomorrow.

Join Now to Subscribe to this Podcast

Podcasts:

 An Inside Look at Highlights from RSA Conference 2018 USA | File Type: audio/mpeg | Duration: 00:20:21

Britta Glade, Curator and Director, RSA Conference and Hugh Thompson, Program Committee Chair, RSA Conference

 RSAC Interview With Tim Jenkin | File Type: audio/mpeg | Duration: 00:40:20

Davi Ottenheimer, of MongoDB, interviews Tim Jenkin, winner of the Excellence in Humanitarian Service award at RSA Conference 2018.

 Innovation | File Type: audio/mpeg | Duration: 00:22:22

Here’s something to ponder: In an alternate universe, where would cybersecurity be today without the continuous pursuit of innovation? While we can only guess, one thing is pretty certain. Cyberattackers would be a lot happier in that universe than they are here. In this episode, we take a look at multiple aspects of industry growth—from revenue and investments to tech advancements and opportunities. Some of the topics we cover include: •What investment strategies are VCs employing in 2018, and how do they differ from previous years? •What criteria should buyers consider in choosing startups to add to their security portfolios? •Based on where the industry is headed, what new and exciting developments can we expect at the RSAC 2018 Early Stage Expo?

 AppSec and DevOps | File Type: audio/mpeg | Duration: 00:32:31

What do AppSec and DevOps have in common besides two-syllable monikers? A lot. Which is why their importance—especially from a risk management and compliance perspective—has not gone unnoticed. Nor has their ability to learn from each other along the way. In this episode, we talk with two guests who draw on their very relevant experiences to weigh in on where AppSec and DevOps are situated today and where they’re possibly headed in the future. Some of the topics we cover include: •With a variety of threats slipping through a growing number of cracks, is threat modeling at speed a viable solution? •What skill set is needed for secure coding, and should companies be responsible for ensuring these skills are met? •What is the single greatest impact that DevSecOps is having within organizations?

 Privacy and Smart Cities | File Type: audio/mpeg | Duration: 00:32:18

It used to be that cities set themselves apart based on population density, cultural attractions and historical significance. But intelligence? Welcome to the intersection of modern living and the Internet of Things. In this episode, we’ll be talking with two guest speakers who weigh in on whether smart cities have rescinded the welcome mat for privacy. Take a look at some of the topics we’ll be covering: •Given how much smart cities “know” about us, can individual and company privacy still be protected? •What steps should corporations take to safeguard all the data they are gathering on smart city citizens? •What are the privacy implications of inviting smart assistants like Alexa and Siri into our homes?

 Spectre And Meltdown | File Type: audio/mpeg | Duration: 00:15:33

It’s never good news when potential security exploits are detected. But when they affect all personal computers, mobile devices and cloud infrastructure dating back to 1995, it creates a problem of a whole new magnitude. In this episode, we’ll be talking with Paul Kocher, the researcher credited with co-discovering Spectre and a co-author of the Meltdown research paper. Some of the topics that we cover include: •How did these vulnerabilities happen, and why were they not detected sooner? •Did the rush to bring technology to market play a role in allowing these exploits to slip through the cracks? •What are the main concerns to look out for—both as an individual and as a CISO?

 Hackers and Threats | File Type: audio/mpeg | Duration: 00:30:40

The holiday season is upon us. And our gift to you? An insider look at the potential threats and countering strategies that could have the greatest impact, for better or worse, in 2018. In this year-end episode, we talk with two cybersecurity luminaries who weigh in on the latest trends as part of a word game. Sound too fun to be enlightening? We promise you’ll learn as much as you’ll laugh. Some of the topics that we cover include: •Does threat intelligence sharing have a future now that IOCs are longer relevant? •Will NotPetya--a new class of attack that allowed only seven seconds to respond--be replicated? •How can we help build the next generation of cybersecurity talent to carry on the battle?

 Security Operations and Strategy | File Type: audio/mpeg | Duration: 00:36:51

People, process, and technology. It’s an interlocked trio that’s vital to most organizations today. And when there’s a shift in security operations or strategy, all three will feel the jolt. In this episode, we’ll be talking with two guest speakers who draw on their firsthand experiences to share must-do and avoid-at-all-costs security operations and strategy advice. Some of the topics that we’ll cover include: •Skills that are most needed for today’s security operations and analyst roles •Differentiating between product security and IT security •How to adapt security operations and architecture for public cloud deployments

 Cybersafety | File Type: audio/mpeg | Duration: 00:36:11

Big numbers have a way of getting our attention. And in the case of recent data breaches, they’re eye-poppingly notable. According to Gemalto, 1.9 billion data records were exposed in the first half of 2017—which equates to 122 records exposed every second in breaches worldwide. In this episode, we’ll be talking with two guest speakers whose cybersafety sessions drew some of the highest scores at RSA Conference 2017. Some of the topics that we’ll cover include: •Are data breaches getting worse, and if so, why? •How do you best measure security awareness? •What role does positive incentives for employees play in keeping data safe?

 Technology and Security | File Type: audio/mpeg | Duration: 00:49:28

What’s the good, the bad and the future of the increasingly close relationship between technology and security? Find out as Ben Jun, CEO, HVF Labs, and Ed Amoroso, CEO, TAG Cyber, share the latest insights into the technology development process.

 Equifax Breach | File Type: audio/mpeg | Duration: 00:20:34

What exactly happened? And how can you best protect yourself? Get answers to these questions and more as Lance Spitzner, Director at SANS Securing the Human, weighs in on the data breach affecting 143 million Equifax users

 Professional Development | File Type: audio/mpeg | Duration: 00:50:29

You know “Must See TV”? Well, this is a must-hear podcast. This episode is focused on professional development, and we’ll be talking with two guest speakers who have very different backgrounds but share a strong commitment to growing the infosec profession. Some of the topics that we’ll cover include: •How we can help develop future cybersecurity aspirants to fill in the current worker-shortage gaps, knowing that purple unicorns remain elusive •How cybersecurity as a profession has changed over the past 10 years, and what to expect moving forward •How contributing to the community and giving back helps shape and enhance your professional development

 Policy and Government | File Type: audio/mpeg | Duration: 00:45:03

Our first episode focuses on policy and government regulations in information security, including: •How the Cybersecurity Framework (CSF) is holding up against the recent wave of attacks •Strategies for keeping up with regulatory CSF changes •Positive and negative aspects of government involvement in cybersecurity

 StoryCorps @ RSAC: Keep Our Eyes On the Horizon | File Type: audio/mpeg | Duration: 00:07:41

There are more chips being made then there are people on the planet now, Paul Kocher, President and Chief Scientist of the Cryptography Research Division of Rambus, tells RSA CTO Zulfikar Ramzan in this StoryCorps @ RSAC podcast. Technology evolves so quickly that we don’t even know what challenges and threats we may face from what we’re developing now. “To me information security has to co-evolve with the development of information technology,” Ramzan says. “To me this is part of a longer journey with many, many interesting factors.” How can we always keep our eye on the horizon and make sure we are implementing the fundamentals? Where do the challenges of the future lurk, and where can we find inspiration and optimism in the face of adversity? You can hear more of their conversation here.

 StoryCorps @ RSAC: The Answer Was You Have a Conference | File Type: audio/mpeg | Duration: 00:07:30

It took a long time for the RSA algorithm to grow from theory to practice – almost 20 years from the time it was invented until it was widely deployed. In this StoryCorps @ RSAC podcast, Jim Bidzos, the founder, CEO and Chairman of Verisign, and former RSA CEO, strolls down memory lane with Burt Kaliski, SVP and CTO of Verisign, and the Founding Scientist of RSA Laboratories. The two discuss the creation of RSA the company and of the RSA Conference, which evolved from a small gathering to a global event that people from the highest levels of industry and government would attend. Along the way, people would contact them telling them they’d found a way to break the RSA algorithm, and would share it for a price. So they created the RSA Factoring Challenge. You can listen to their conversation on the impact of RSA on the connected digital world here.

Comments

Login or signup comment.